首页 科技问答 叉烧,F100和U200野蛮模式建立ipsec失败

叉烧,F100和U200野蛮模式建立ipsec失败

科技问答 268
1681744900,CRM论坛(CRMbbs.com)——一个让用户更懂CRM的垂直性行业内容平台,CRM论坛致力于互联网、客户管理、销售管理、SCRM私域流量内容输出5年。 如果您有好的内容,欢迎向我们投稿,共建CRM多元化生态体系,创建CRM客户管理一体化生态解决方案。内容来源:知了社区叉烧 叉烧 二段 粉丝:0人 关注:0人

问题描述:

U

*Oct 26 09:18:59:474

*Oct 26 09:18:59:474

*Oct 26 09:18:59:475

*Oct 26 09:18:59:475


昨天搞了一天了,大佬们能不能帮忙找下问题


组网及组网描述:

这里是两边的配置

<u

#

 version 5.

#

 sysname u

#

 l2tp enable

#

 undo voice vlan mac-address 00e0-bb00-0000

#

 ike local-name u

#

 ip pool 1 192.168.0.2 192.168.0.254

#

 domain default enable system

#

 telnet server enable

#

acl number

 rule 0 permit

#

acl number 3000

 rule 0 permit tcp source 0.0.0.2 255.255.255.252 destination 192.168.0.11 0

acl number 3001

 rule 10 permit ip source 192.168.0.0 0.0.0.255 destination 192.168.1.0 0.0.0.255

acl number 3002

 rule 5 deny ip source 192.168.0.0 0.0.0.255 destination 192.168.1.0 0.0.0.255

 rule 10 permit ip

#

vlan 1

#

domain system

 authentication ppp local

 access-limit disable

 state active

 idle-cut disable

 self-service-url disable

 ip pool 1 172.16.1.2 172.16.1.254

#

pki domain default

  crl check disable

#

ike proposal 1

 encryption-algorithm 3des-cbc

 dh group2

 authentication-algorithm md5

#

ike peer 1     

 exchange-mode aggressive

 pre-shared-key simple jmsx@123

 remote-name f100

 local-address 2

 nat traversal

#

ipsec proposal 1

 esp encryption-algorithm 3des

#

ipsec policy 1 1 isakmp

 security acl 3001

 ike-peer 1

 proposal 1

#

user-group system

#

local-user admin

 password cipher \@9>C=-:@@KQ=^Q`MAF4<1!!

 authorization-attribute level 3

 service-type telnet

local-user user1

 password cipher 0`FUW8DO]`3Q=^Q`MAF4<1!!

 authorization-attribute level 3

 service-type ppp

local-user usera

 password simple usera

 service-type ppp

local-user works

 password simple gmwork

 service-type ppp

#

l2tp-group 1

 mandatory-lcp

 allow l2tp virtual-template 1

 tunnel name LNS

#

interface Virtual-Template1

 ppp authentication-mode chap domain system

 remote address pool 1

 ip address 172.16.1.1 255.255.255.0

#

interface NULL0

#

interface GigabitEthernet0/0

 port link-mode route

 ip address 192.168.2.1 255.255.255.0

#

interface GigabitEthernet0/1

 port link-mode route

 ip address 192.168.0.1 255.255.255.0

#

interface GigabitEthernet0/2

 port link-mode route

 ip address 192.168.10.1 255.255.255.0

#

interface GigabitEthernet0/3

 port link-mode route

#

interface GigabitEthernet0/4

 port link-mode route

 nat outbound 3002

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol udp global 2

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol udp global 2

 nat server protocol tcp global 2

 nat server protocol udp global 2

 nat server protocol udp global 2

 nat server protocol tcp global 2

 nat server protocol tcp global 2

 nat server protocol udp global 2

 nat server protocol tcp global 2

 nat server protocol udp global 2

 nat server protocol tcp global 2

 ip address 2

 ipsec policy 1

#

 ip route-static 0.0.0.0 0.0.0.0 2

 ip route-static 192.168.0.0 255.255.255.0 GigabitEthernet0/1 172.16.1.22

#

 nat static 192.168.0.0 2

#

 load xml-configuration

#              

 load tr069-configuration

#

user-interface con 0

user-interface vty 0 4

 authentication-mode scheme

#

return



最佳答案

到底是第几阶段没起来,防火墙上debug IPsec信息呢

暂无

<f100>dis cu

#

 version 7.1.064, Release 9510P06

#

 sysname f100

#

context Admin id 1

#

 irf mac-address persistent timer

 irf auto-update enable

 undo irf link-delay

 irf member 1 priority 1

#

 security-zone intra-zone default permit

#

 dialer-group 1 rule ip permit

#

 dhcp enable

 dhcp server forbidden-ip 192.168.1.1 192.168.1.99

#

 password-recovery enable

#

vlan 1

#

dhcp server ip-pool 1

 gateway-list 192.168.1.1

 network 192.168.1.0 mask 255.255.255.0

 dns-list 114.114.114.114

 forbidden-ip 192.168.1.1

 forbidden-ip 192.168.1.99

#

interface Dialer1

 mtu 1450

 ppp chap password cipher $c$3$GUfeJHWJOvC0i1EDaZJEIuHWXv8L0Y5FOA==

 ppp chap user pppoe_jiemsx804

 ppp pap local-user pppoe_jiemsx804 password cipher $c$3$p/ZkZlMM71C11g/YnO2z60atYn6kpKdaPA==

 dialer bundle enable

 dialer-group 1

 dialer timer idle 0

 dialer timer autodial 60

 ip address ppp-negotiate

 tcp mss 1024

 nat outbound 3002

 ipsec apply policy 1

#

interface NULL0

#

interface Vlan-interface1

 ip address 192.168.1.1 255.255.255.0

 nat hairpin enable

#

interface GigabitEthernet1/0/0

 port link-mode route

 combo enable copper

 ip address 192.168.100.1 255.255.255.0

#

interface GigabitEthernet1/0/1

 port link-mode route

 description waiwang

 combo enable copper

 pppoe-client dial-bundle-number 1

 ipsec apply policy 1

#

interface GigabitEthernet1/0/2

 port link-mode route

#

interface GigabitEthernet1/0/4

 port link-mode route

#

interface GigabitEthernet1/0/5

 port link-mode route

#

interface GigabitEthernet1/0/6

 port link-mode route

#

interface GigabitEthernet1/0/7

 port link-mode route

#

interface GigabitEthernet1/0/8

 port link-mode route

#

interface GigabitEthernet1/0/9

 port link-mode route

#

interface GigabitEthernet1/0/10

 port link-mode route

#

interface GigabitEthernet1/0/11

 port link-mode route

#

interface GigabitEthernet1/0/3

 port link-mode bridge

#

security-zone name Local

#

security-zone name Trust

 import interface Vlan-interface1

 import interface GigabitEthernet1/0/3 vlan 1

#

security-zone name DMZ

#

security-zone name Untrust

 import interface Dialer1

 import interface GigabitEthernet1/0/1

#

security-zone name Management

 import interface GigabitEthernet1/0/0

 import interface GigabitEthernet1/0/2

#

zone-pair security source DMZ destination Local

 packet-filter 3000

#

zone-pair security source DMZ destination Trust

 packet-filter 3000

#

zone-pair security source DMZ destination Untrust

 packet-filter 3000

#

zone-pair security source Local destination DMZ

 packet-filter 3000

#

zone-pair security source Local destination Trust

 packet-filter 3000

#

zone-pair security source Local destination Untrust

 packet-filter 3000

#

zone-pair security source Trust destination DMZ

 packet-filter 3000

#

zone-pair security source Trust destination Local

 packet-filter 3000

#

zone-pair security source Trust destination Untrust

 packet-filter 3000

#

zone-pair security source Untrust destination DMZ

 packet-filter 3000

#

zone-pair security source Untrust destination Local

 packet-filter 3000

#

zone-pair security source Untrust destination Trust

 packet-filter 3000

#

 scheduler logfile size 16

#

line class aux

 user-role network-operator

#

line class console

 user-role network-admin

#

line class vty

 user-role network-operator

#

line aux 0

 user-role network-admin

#

line con 0

 authentication-mode scheme

 user-role network-admin

#             

line vty 0 63

 authentication-mode scheme

 user-role network-admin

#

 ip route-static 0.0.0.0 0 Dialer1

#

 ssh server enable

#

acl advanced 3000

 rule 10 permit ip

#

acl advanced 3001

 rule 10 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.0.0 0.0.0.255

#

acl advanced 3002

 rule 5 deny ip source 192.168.1.0 0.0.0.255 destination 192.168.0.0 0.0.0.255

 rule 10 permit ip

#

domain system

#

 aaa session-limit ftp 16

 aaa session-limit telnet 16

 aaa session-limit ssh 16

 domain default enable system

#

role name level-0

 description Predefined level-0 role

#

role name level-1

 description Predefined level-1 role

#

role name level-2

 description Predefined level-2 role

#

role name level-3

 description Predefined level-3 role

#

role name level-4

 description Predefined level-4 role

#

role name level-5

 description Predefined level-5 role

#

role name level-6

 description Predefined level-6 role

#             

role name level-7

 description Predefined level-7 role

#

role name level-8

 description Predefined level-8 role

#

role name level-9

 description Predefined level-9 role

#

role name level-10

 description Predefined level-10 role

#

role name level-11

 description Predefined level-11 role

#

role name level-12

 description Predefined level-12 role

#

role name level-13

 description Predefined level-13 role

#

role name level-14

 description Predefined level-14 role

#

user-group system

#

local-user admin class manage

 password hash $h$6$qlSd6v6XTza3GBaJ$WAwvyKZynjIAlckEmm3vJ481VMU2kMQHgf6MQo+OLBV6lAL8ps2PduIYwZ+NyTOvWmKP9rQoIL02bM+IchkiqA==

 service-type ssh terminal https

 authorization-attribute user-role level-3

 authorization-attribute user-role network-admin

 authorization-attribute user-role network-operator

#

ipsec transform-set 1

 esp encryption-algorithm 3des-cbc

 esp authentication-algorithm md5

#

ipsec policy-template 1 1

 transform-set 1

 security acl 3001

 remote-address 2

 ike-profile 1

#

ipsec policy 1 1 isakmp template 1

#

 ike identity fqdn f100

#

ike profile 1

 keychain 1

 exchange-mode aggressive

 local-identity fqdn f100

 match remote identity address 0.0.0.0 0.0.0.0

 match local address Dialer1

 proposal 1

#

ike proposal 1

 encryption-algorithm 3des-cbc

 dh group2

 authentication-algorithm md5

#

ike keychain 1

 match local address Dialer1

 pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$q+ioTTx4SmUhuzn7Ge5Qt5OxMdmsVgxs836J

#

 ip https enable

#

return<f100>dis cu

#

 version 7.1.064, Release 9510P06

#

 sysname f100

#

context Admin id 1

#

 irf mac-address persistent timer

 irf auto-update enable

 undo irf link-delay

 irf member 1 priority 1

#

 security-zone intra-zone default permit

#

 dialer-group 1 rule ip permit

#

 dhcp enable

 dhcp server forbidden-ip 192.168.1.1 192.168.1.99

#

 password-recovery enable

#

vlan 1

#

dhcp server ip-pool 1

 gateway-list 192.168.1.1

 network 192.168.1.0 mask 255.255.255.0

 dns-list 114.114.114.114

 forbidden-ip 192.168.1.1

 forbidden-ip 192.168.1.99

#

interface Dialer1

 mtu 1450

 ppp chap password cipher $c$3$GUfeJHWJOvC0i1EDaZJEIuHWXv8L0Y5FOA==

 ppp chap user pppoe_jiemsx804

 ppp pap local-user pppoe_jiemsx804 password cipher $c$3$p/ZkZlMM71C11g/YnO2z60atYn6kpKdaPA==

 dialer bundle enable

 dialer-group 1

 dialer timer idle 0

 dialer timer autodial 60

 ip address ppp-negotiate

 tcp mss 1024

 nat outbound 3002

 ipsec apply policy 1

#

interface NULL0

#

interface Vlan-interface1

 ip address 192.168.1.1 255.255.255.0

 nat hairpin enable

#

interface GigabitEthernet1/0/0

 port link-mode route

 combo enable copper

 ip address 192.168.100.1 255.255.255.0

#

interface GigabitEthernet1/0/1

 port link-mode route

 description waiwang

 combo enable copper

 pppoe-client dial-bundle-number 1

 ipsec apply policy 1

#

interface GigabitEthernet1/0/2

 port link-mode route

#

interface GigabitEthernet1/0/4

 port link-mode route

#

interface GigabitEthernet1/0/5

 port link-mode route

#

interface GigabitEthernet1/0/6

 port link-mode route

#

interface GigabitEthernet1/0/7

 port link-mode route

#

interface GigabitEthernet1/0/8

 port link-mode route

#

interface GigabitEthernet1/0/9

 port link-mode route

#

interface GigabitEthernet1/0/10

 port link-mode route

#

interface GigabitEthernet1/0/11

 port link-mode route

#

interface GigabitEthernet1/0/3

 port link-mode bridge

#

security-zone name Local

#

security-zone name Trust

 import interface Vlan-interface1

 import interface GigabitEthernet1/0/3 vlan 1

#

security-zone name DMZ

#

security-zone name Untrust

 import interface Dialer1

 import interface GigabitEthernet1/0/1

#

security-zone name Management

 import interface GigabitEthernet1/0/0

 import interface GigabitEthernet1/0/2

#

zone-pair security source DMZ destination Local

 packet-filter 3000

#

zone-pair security source DMZ destination Trust

 packet-filter 3000

#

zone-pair security source DMZ destination Untrust

 packet-filter 3000

#

zone-pair security source Local destination DMZ

 packet-filter 3000

#

zone-pair security source Local destination Trust

 packet-filter 3000

#

zone-pair security source Local destination Untrust

 packet-filter 3000

#

zone-pair security source Trust destination DMZ

 packet-filter 3000

#

zone-pair security source Trust destination Local

 packet-filter 3000

#

zone-pair security source Trust destination Untrust

 packet-filter 3000

#

zone-pair security source Untrust destination DMZ

 packet-filter 3000

#

zone-pair security source Untrust destination Local

 packet-filter 3000

#

zone-pair security source Untrust destination Trust

 packet-filter 3000

#

 scheduler logfile size 16

#

line class aux

 user-role network-operator

#

line class console

 user-role network-admin

#

line class vty

 user-role network-operator

#

line aux 0

 user-role network-admin

#

line con 0

 authentication-mode scheme

 user-role network-admin

#             

line vty 0 63

 authentication-mode scheme

 user-role network-admin

#

 ip route-static 0.0.0.0 0 Dialer1

#

 ssh server enable

#

acl advanced 3000

 rule 10 permit ip

#

acl advanced 3001

 rule 10 permit ip source 192.168.1.0 0.0.0.255 destination 192.168.0.0 0.0.0.255

#

acl advanced 3002

 rule 5 deny ip source 192.168.1.0 0.0.0.255 destination 192.168.0.0 0.0.0.255

 rule 10 permit ip

#

domain system

#

 aaa session-limit ftp 16

 aaa session-limit telnet 16

 aaa session-limit ssh 16

 domain default enable system

#

role name level-0

 description Predefined level-0 role

#

role name level-1

 description Predefined level-1 role

#

role name level-2

 description Predefined level-2 role

#

role name level-3

 description Predefined level-3 role

#

role name level-4

 description Predefined level-4 role

#

role name level-5

 description Predefined level-5 role

#

role name level-6

 description Predefined level-6 role

#             

role name level-7

 description Predefined level-7 role

#

role name level-8

 description Predefined level-8 role

#

role name level-9

 description Predefined level-9 role

#

role name level-10

 description Predefined level-10 role

#

role name level-11

 description Predefined level-11 role

#

role name level-12

 description Predefined level-12 role

#

role name level-13

 description Predefined level-13 role

#

role name level-14

 description Predefined level-14 role

#

user-group system

#

local-user admin class manage

 password hash $h$6$qlSd6v6XTza3GBaJ$WAwvyKZynjIAlckEmm3vJ481VMU2kMQHgf6MQo+OLBV6lAL8ps2PduIYwZ+NyTOvWmKP9rQoIL02bM+IchkiqA==

 service-type ssh terminal https

 authorization-attribute user-role level-3

 authorization-attribute user-role network-admin

 authorization-attribute user-role network-operator

#

ipsec transform-set 1

 esp encryption-algorithm 3des-cbc

 esp authentication-algorithm md5

#

ipsec policy-template 1 1

 transform-set 1

 security acl 3001

 remote-address 2

 ike-profile 1

#

ipsec policy 1 1 isakmp template 1

#

 ike identity fqdn f100

#

ike profile 1

 keychain 1

 exchange-mode aggressive

 local-identity fqdn f100

 match remote identity address 0.0.0.0 0.0.0.0

 match local address Dialer1

 proposal 1

#

ike proposal 1

 encryption-algorithm 3des-cbc

 dh group2

 authentication-algorithm md5

#

ike keychain 1

 match local address Dialer1

 pre-shared-key address 0.0.0.0 0.0.0.0 key cipher $c$3$q+ioTTx4SmUhuzn7Ge5Qt5OxMdmsVgxs836J

#

 ip https enable

#

return

暂无

你正在,F100和U200野蛮模式建立ipsec失败